skip to main content
10.1145/3277570.3277575acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceccConference Proceedingsconference-collections
research-article

A brief look at the security of DeviceNet communication in industrial control systems

Published:15 November 2018Publication History

ABSTRACT

Security is a vital aspect of industrial control systems since they are used in critical infrastructures and manufacturing processes. As demonstrated by the increasing number of emerging exploits, securing such systems is still a challenge as the employed fieldbus technologies do not offer intrinsic support for basic security objectives. In this work we discuss some security aspects of DeviceNet, a communication protocol widely used for control applications especially in the North American industrial sector. Having the Controller Area Network (CAN) protocol at its base, DeviceNet inherits all the vulnerabilities that were already illustrated on CAN in-vehicle communication. We discuss how the lack of security in DeviceNet can be exploited and point on the fact that these vulnerabilities can be modelled by existing formal verification tools and countermeasures can be put in place.

References

  1. Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, et al. 2012. The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures. In Intl. Conf, on Tools and Algorithms for the Construction and Analysis of Systems. Springer, 267--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AUTOSAR 2017. Specification of Secure Onboard Communication (4.3.1 ed.). AUTOSAR.Google ScholarGoogle Scholar
  3. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, et al. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Samuel East, Jonathan Butts, Mauricio Papa, and Sujeet Shenoi. 2009. A Taxonomy of Attacks on the DNP3 Protocol. In Intl. Conf. on Critical Infrastructure Protection. Springer, 67--81.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ryan Grandgenett, William Mahoney, and Robin Gandhi. 2015. Authentication Bypass and Remote Escalated I/O Command Attacks. In Proc. of the 10th Annual Cyber and Information Security Research Conf. ACM, New York, USA, 2:1--2:7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bogdan Groza and Pal-Stefan Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Veh. Tech. Magazine 13, 1 (2018), 40--47.Google ScholarGoogle ScholarCross RefCross Ref
  7. Peter Huitsing, Rodrigo Chandia, Mauricio Papa, and Sujeet Shenoi. 2008. Attack taxonomies for the Modbus protocols. Intl. Journal of Critical Infrastructure Protection 1 (2008), 37--44.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ralph Langner. 2013. To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. The Langner Group.Google ScholarGoogle Scholar
  9. Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. DEF CON 21 (2013), 260--264.Google ScholarGoogle Scholar
  10. Pal-Stefan Murvay and Bogdan Groza. 2017. DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. In 3rd International Workshop on Secure Software Engineering.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ODVA 2010. The CIP Networks Library Vol. 1: Common Industrial Protocol (CIP), Edition 3.9. ODVA.Google ScholarGoogle Scholar
  12. ODVA 2010. The CIP Networks Library Vol. 3: DeviceNet Adaptation of CIP, Edition 1.10. ODVA.Google ScholarGoogle Scholar
  13. ODVA. 2016. Optimization of Industrial Cybersecurity: ODVA's Vision for Securing the Flow of Data in Industrial Networks. ODVA.Google ScholarGoogle Scholar
  14. ODVA. 2016. Technology Overview Series: DeviceNet. ODVA.Google ScholarGoogle Scholar
  15. Robert Bosch GmbH 1991. CAN Specification, Version 2.0, Part A. Robert Bosch GmbH.Google ScholarGoogle Scholar
  16. Viktor Schiffer. 2016. Common Industrial Protocol (CIP) and the Family of CIP Networks. ODVA.Google ScholarGoogle Scholar
  17. Francisco Tacliad, Thuy D Nguyen, and Mark Gondree. 2017. DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing. In Proceedings of the 3rd Annual Industrial Control System Security Workshop. ACM, 24--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mathieu Turuani. 2006. The CL-Atse protocol analyser. In Intl. Conf. on Rewriting Techniques and Applications. Springer, 277--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. David Urbina, Jairo Alonso Giraldo, Nils Ole Tippenhauer, and Alvaro Cárdenas. 2016. Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed. In SG-CRC. Springer, 75--89.Google ScholarGoogle Scholar
  20. Marko Wolf, André Weimerskirch, and Christof Paar. 2004. Security in automotive bus systems. In Workshop on Embedded Security in Cars.Google ScholarGoogle Scholar
  21. Kim Zetter. 2016. Inside the cunning, unprecedented hack of Ukrain's power grid. https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/. {Online; accessed 1-July-2018}.Google ScholarGoogle Scholar

Index Terms

  1. A brief look at the security of DeviceNet communication in industrial control systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018
          November 2018
          109 pages
          ISBN:9781450365154
          DOI:10.1145/3277570

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 November 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          CECC 2018 Paper Acceptance Rate19of30submissions,63%Overall Acceptance Rate38of65submissions,58%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader